搜索结果: 1-15 共查到“SHA-1”相关记录93条 . 查询时间(0.089 秒)
SHA.LIN评分在预测输尿管软镜碎石术结石清除率中的价值
尿路结石 输尿管软镜术 分级 预后 围手术期 SHA.LIN评分
font style='font-size:12px;'>
2021/3/3
探讨SHA.LIN评分用于预测输尿管软镜碎石取石术结石清除率的临床价值。 方法? 回顾性分析行输尿管软镜碎石术的240例上尿路结石患者的临床资料,利用术前泌尿系CT平扫+三维重建影像资料,由同一名泌尿外科医师根据SHA.LIN、S.T.O.N.E、RUSS评分对患者术前结石特征进行评分并数据录入,分析SHA.LIN评分与结石清除情况、手术时间、住院时间、术后并发症等指标的关系。
From Collisions to Chosen-Prefix Collisions - Application to Full SHA-1
hash function cryptanalysis chosen-prefix collision
font style='font-size:12px;'>
2019/5/13
A chosen-prefix collision attack is a stronger variant of a collision attack, where an arbitrary pair of challenge prefixes are turned into a collision. Chosen-prefix collisions are usually significan...
Authenticated Encryption Mode IAPM using SHA-3's Public Random Permutation
IAPM AES
font style='font-size:12px;'>
2018/2/6
We study instantiating the random permutation of the block-cipher mode of operation IAPM (Integrity-Aware Parallelizable Mode) with the public random permutation of Keccak, on which the draft standard...
Exploiting an HMAC-SHA-1 optimization to speed up PBKDF2
HMAC-SHA-1 Password-Based Key Derivation Function 2 Boyar-Peralta heuristic
font style='font-size:12px;'>
2018/1/29
PBKDF2 [27] is a well-known password-based key derivation function. In order to slow attackers down, PBKDF2 introduces CPU-intensive operations based on an iterated pseudorandom function (in our case ...
Differential Fault Analysis of SHA-3 under Relaxed Fault Models
SHA-3 DFA
font style='font-size:12px;'>
2017/9/13
Keccak-based algorithms such as Secure Hash Algorithm-3 (SHA-3) will be widely used in crypto systems, and evaluating their security against different kinds of attacks is vitally important. This paper...
The first collision for full SHA-1
hash function cryptanalysis collision attack
font style='font-size:12px;'>
2017/3/6
SHA-1 is a widely used 1995 NIST cryptographic hash function standard that was officially deprecated by NIST in 2011 due to fundamental security weaknesses demonstrated in various analyses and theoret...
Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions
hash functions SHA-1 counter-cryptanalysis
font style='font-size:12px;'>
2017/2/28
Counter-cryptanalysis, the concept of using cryptanalytic techniques to detect cryptanalytic attacks, was first introduced by Stevens at CRYPTO 2013 with a hash collision detection algorithm. That is,...
Algebraic Fault Analysis of SHA-3
SHA-3 Keccak Algebraic fault analysis
font style='font-size:12px;'>
2017/2/20
This paper presents an efficient algebraic fault analysis on all four modes of SHA-3 under relaxed fault models. This is the first work to apply algebraic techniques on fault analysis of SHA-3. Result...
Estimating the cost of generic quantum pre-image attacks on SHA-2 and SHA-3
quantum cryptanalysis hash functions cost models
font style='font-size:12px;'>
2016/12/8
We investigate the cost of Grover's quantum search algorithm when used in the context of pre-image attacks on the SHA-2 and SHA-3 families of hash functions. Our cost model assumes that the attack is ...
On Plausible Tree Hash Modes for SHA-3
SHA-3 Hash functions Sakura
font style='font-size:12px;'>
2016/6/29
Discussions are currently underway about the choice of a
tree hash mode of operation for a standardization. It appears that a
single tree mode cannot address the specificities of all possible uses a...
Analysis of SHA-512/224 and SHA-512/256
hash functions cryptanalysis collisions
font style='font-size:12px;'>
2016/4/15
In 2012, NIST standardized SHA-512/224 and SHA-512/256, two truncated variants of SHA-512, in FIPS 180-4. These two hash functions are faster than SHA-224 and SHA-256 on 64-bit platforms, while mainta...
Parallelized hashing via j-lanes and j-pointers tree modes, with applications to SHA-256
Tree mode hashing SHA-256 SIMD architecture
font style='font-size:12px;'>
2016/1/25
The j-lanes tree hashing is a tree mode that splits an input message to
j slices, computes j independent digests of each slice, and outputs the hash value
of their concatenation. The j-pointers tree...
Logical Reasoning to Detect Weaknesses About SHA-1 and MD4/5
Logical cryptanalysis MD5 SHA-1 Satisfiability
font style='font-size:12px;'>
2016/1/23
In recent years, studies about the SATisfiability Problem (short for SAT) were more and more numerous because of its conceptual simplicity and ability to express a large set of various problems. Wit...
Branching Heuristics in Differential Collision Search with Applications to SHA-512
hash functions cryptanalysis SHA-512
font style='font-size:12px;'>
2016/1/23
In this work, we present practical semi-free-start collisions for SHA-512 on up to 38 (out of 80) steps with complexity 240.5 . The best previously published result was on 24 steps. The attack is b...
Malicious Hashing: Eve's Variant of SHA-1
hash functions cryptanalysis SHA-1
font style='font-size:12px;'>
2016/1/7
We present collisions for a version of SHA-1 with modified constants,
where the colliding payloads are valid binary files. Examples are given of colliding
executables, archives, and images. Our mali...